Dr Ashok Kumar Das
International Institute of Information Technology Hyderabad
Faculty Member, Computer Science
India
My co-authors include
Dr Saru Kumari
Professor Atul Negi
Professor Joel J.P.C. Rodrigues
My Publications
On the design of secure user authenticated key management scheme for multigateway-based...
International Journal of Communication Systems
February 2018
Jamming resistant non-interactive anonymous and unlinkable authentication scheme for mo...
Security and Communication Networks
December 2016
Provably secure three-factor authentication and key agreement scheme for session initia...
Security and Communication Networks
November 2016
Design of sinkhole node detection mechanism for hierarchical wireless sensor networks
Security and Communication Networks
October 2016
Provably secure biometric-based user authentication and key agreement scheme in cloud c...
Security and Communication Networks
September 2016
Provably secure user authentication and key agreement scheme for wireless sensor networks
Security and Communication Networks
August 2016
Design of a new CP-ABE with constant-size secret keys for lightweight devices using ell...
Security and Communication Networks
August 2016
A secure lightweight authentication scheme with user anonymity for roaming service in u...
Security and Communication Networks
August 2016
A novel and provably secure authentication and key agreement scheme with user anonymity...
Security and Communication Networks
July 2016
Design of a provably secure identity-based digital multi-signature scheme using biometr...
Security and Communication Networks
July 2016
Design of an efficient and provably secure anonymity preserving three-factor user authe...
Security and Communication Networks
January 2016
An efficient multi-gateway-based three-factor user authentication and key agreement sch...
Security and Communication Networks
January 2016
An efficient biometric-based privacy-preserving three-party authentication with key agr...
Security and Communication Networks
August 2015
An efficient approach for mining association rules from high utility itemsets
Expert Systems with Applications
August 2015
An Effective and Robust Secure Remote User Authenticated Key Agreement Scheme Using Sma...
Wireless Personal Communications
May 2015
An anonymous and secure biometric-based enterprise digital rights management system for...
Security and Communication Networks
May 2015
DMAMA: Dynamic Migration Access Control Mechanism for Mobile Agents in Distributed Netw...
Wireless Personal Communications
May 2015
An efficient ECC-based privacy-preserving client authentication protocol with key agree...
Journal of Information Security and Applications
April 2015
A Secure User Anonymity-Preserving Three-Factor Remote User Authentication Scheme for t...
Journal of Medical Systems
February 2015
A Secure and Robust Password-Based Remote User Authentication Scheme Using Smart Cards ...
Journal of Medical Systems
February 2015
A secure and effective biometric-based user authentication scheme for wireless sensor n...
International Journal of Communication Systems
January 2015
A Secure and Efficient User Anonymity-Preserving Three-Factor Authentication Protocol f...
Wireless Personal Communications
January 2015
A secure and effective access control scheme for distributed wireless sensor networks
International Journal of Communication Networks and Distributed Systems
January 2015
A secure and robust temporal credential-based three-factor user authentication scheme f...
Peer-to-Peer Networking and Applications
December 2014
A secure and efficient ECC-based user anonymity-preserving session initiation authentic...
Peer-to-Peer Networking and Applications
December 2014
A secure user anonymity-preserving biometric-based multi-server authenticated key agree...
Expert Systems with Applications
December 2014
A secure and efficient ECC-based user anonymity preserving single sign-on scheme for di...
Security and Communication Networks
October 2014
An effective ECC-based user access control scheme with attribute-based encryption for w...
Security and Communication Networks
October 2014
An Enhanced Biometric Authentication Scheme for Telecare Medicine Information Systems w...
Journal of Medical Systems
June 2014
A secure effective key management scheme for dynamic access control in a large leaf cla...
Information Sciences
June 2014
An effective association rule mining scheme using a new generic basis
Knowledge and Information Systems
February 2014
Cryptanalysis of an Efficient Biometric Authentication Protocol for Wireless Sensor Net...
January 2014
An efficient access control scheme in user hierarchy based on polynomial interpolation ...
International Journal of Communication Networks and Distributed Systems
January 2014
A survey on user access control in wireless sensor networks with formal security verifi...
International Journal of Trust Management in Computing and Communications
January 2014
A Robust and Effective Smart-Card-Based Remote User Authentication Mechanism Using Hash...
The Scientific World JOURNAL
January 2014
Security Analysis of an Adaptable and Scalable Group Access Control Scheme for Managing...
January 2014
Formal security analysis and verification of a password-based user authentication schem...
International Journal of Trust Management in Computing and Communications
January 2014
An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme...
Journal of Medical Systems
September 2013
A NOVEL EFFICIENT ACCESS CONTROL SCHEME FOR LARGE-SCALE DISTRIBUTED WIRELESS SENSOR NET...
International Journal of Foundations of Computer Science
August 2013
A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication S...
Journal of Medical Systems
May 2013
An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medi...
Journal of Medical Systems
February 2013
A novel linear polynomial-based dynamic key management scheme for hierarchical access c...
International Journal of Trust Management in Computing and Communications
January 2013
LHSC: An effective dynamic key management scheme for linear hierarchical access control
January 2013
Security Analysis of an Efficient Smart Card-Based Remote User Authentication Scheme Us...
January 2013
Formal Security Verification of a Dynamic Password-Based User Authentication Scheme for...
January 2013
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic ...
Information Sciences
November 2012
A dynamic password-based user authentication scheme for hierarchical wireless sensor ne...
Journal of Network and Computer Applications
September 2012
A secure and effective user authentication and privacy preserving protocol with smart c...
Networking Science
July 2012
A random key establishment scheme for multi-phase deployment in large-scale distributed...
International Journal of Information Security
April 2012
A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linea...
January 2012
An ECC-Based Two-Party Authenticated Key Agreement Protocol for Mobile Ad Hoc Networks
Journal of Computers
November 2011
A Key Establishment Scheme for Mobile Wireless Sensor Networks Using Post-Deployment Kn...
International journal of Computer Networks & Communications
July 2011
Cryptanalysis And Further Improvement Of A Biometric-Based Remote User Authentication S...
International Journal of Network Security & Its Applications
March 2011
A Secure Proxy Blind Signature Scheme Based on DLP
January 2010
A Location-Adaptive Key Establishment Scheme for Large-Scale Distributed Wireless Senso...
Journal of Computers
September 2009
An efficient random key distribution scheme for large-scale distributed sensor networks
Security and Communication Networks
June 2009
An unconditionally secure key management scheme for large-scale heterogeneous wireless ...
January 2009
An unconditionally secure location-aware key management scheme for static sensor networks
Journal of Discrete Mathematical Sciences and Cryptography
June 2008
An effective group-based key establishment scheme for large-scale wireless sensor netwo...
January 2008
A Key Reshuffling Scheme for Wireless Sensor Networks
January 2005
Key Forwarding: A Location-Adaptive Key-Establishment Scheme for Wireless Sensor Networks
January 2005
A Key Establishment Scheme for Large-Scale Mobile Wireless Sensor Networks